Vulnerability Assessment
It is not a matter of if an attack will occur, but a matter of when. The most important asset of an organization is its data.
Determine the Assets to be protected.
The 2 most common assets are people and physical assets.
Create an inventory of the IT Assets.
Next, determine the value of each Asset.
The questions to ask are:
How much revenue does the asset generate?
How difficult is it to replace the asset?
What impact does the loss of the asset has on the organization?
Category of Threat Example
Natural Disaster Fire, flood, hurricane, destroys data
Compromise of Intellectual property Copyrights, or pirated software
Espionage Spy steal production schedule
Extortion Mail clerk is blackmailed into intercepting mails
Hardware failure or error Firewall blocks all network traffic
Human Errors Employee drops laptops in public space
Sabotage or Vandalism Attackers implants worms that erase files
Software attacks Virus, Worm, DDoS, compromise hardware or software
Technical Obsolescence Programs does not function under new version of operating System
Theft Desktops system are stolen from unlocked rooms
Utility interruption Electrical power is cut off
Threat Modeling is used to understand:
Human error threat to a network hardware device includes:
Vulnerability assessment must be conducted by a team of diverse members not 1 person.
Risk Assessment determines the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
Loss of wireless connectivity in the cafeteria is a temporary inconvenience, but does not affect production.
Risk Calculation Formulas are:
It is a product of Asset Value (AV) and Exposure Factor (EF).
EF is the % of the AV destroyed by a particular risk.
SLE = AV * EF.
It is a product of SLE and Annualized Rate of Occurrence (ARO) in a year.
ALE = SLE * ARO
Next, estimate the probability of the vulnerability actually occurring.
Either use statistical analysis or guess.
The scale is 1 to 10, 10 being very likely.
Final step is to determine what to do about the risk or Risk Mitigation.
Risks cannot be entirely eliminated.
The question to ask is, “How much acceptable risk can we tolerate?”
When confronted with risk the 3 options are:
Outsource the creation, maintenance and management of the Web Server.
Retained Risk = (Cost of the asset – Insurance coverage)
Instead of purchasing insurance, join a Risk Retention Pool.
No premiums are paid, but losses are assessed by all members of the group.
The final approach is to accept the risk if the advantages outweigh the disadvantages.
Providing Smartphones to employees is risky, because employee can lose the phone with company data.
But, if employees do not have Smartphones, there will be loss of revenue.
Therefore, accept the risk and provide Smartphones to employees.
Most property and risks are not insured against war.
The risk is too large to be insured.
Therefore, some risks have to be accepted.
Some risks cannot be diminished or transferred.
Techniques used in Vulnerability Assessment are:
Usually Baseline refers to the Initial Value.
In Networking, the Baseline is recorded when a New Network System is installed and running smoothly.
In IT security, the Initial Value is not the current state of the system.
Initial Value is the standard against which the current state is compared.
Baseline Reporting is a comparison of the present state of a system compared to its baseline.
Differences in technical, management and operational issues must be noted and addressed.
Deviations from the Baseline may not be harmful.
The deviation (difference) might be appropriate for the system.
The differences must:
Flaws in OS, Applications and Utility programs are an attacker’s ally.
Software vulnerabilities must be minimized during software development not via patches later.
Errors in design and coding errors cause the software to function differently from the intended behavior.
Minimizing software errors is difficult for the following reasons:
Assessment techniques in software development to minimize vulnerabilities are:
Understanding the hardware and software architecture and how they interact minimizes design flaws and hence reduces attacks.
Some software developers employ Security Consultants from the inception of the project to assist in the creation of a secure application.
Attack Surface is also examined at this time.
Limiting Attack Surface includes:
3.1 Validating user input
3.2 Reducing the amount of codes running to a minimum
3.3 Eliminating or restricting Services invoked by the software
Linus Torvalds Law: “Given enough eyeballs, all bugs are shallow”
Tools available for Vulnerability Assessment are:
The Vulnerability Assessment Tools can also be used by Attackers to uncover vulnerabilities.
Logical Ports are allocated a Number called Port Number to identify a service or program.
Physical Ports are interfaces (USB Port) on a controller card or a PC.
A Port Number is 16-bit long and Port Numbers range from 0 to 65,535 (=216).
Well-known Port Numbers (0 to 1,023) – reserved for Universal Applications
Registered Port Numbers (1,024 to 49,151) – used by other Applications
Dynamic and Private Port Numbers (49,152 to 65,535) – available for use by any Application
Port Scanner software can search a system for any Port Vulnerabilities.
Port Scanners are used to determine the State of the Port to know what Applications are running and could be exploited.
Port States are:
Protocol Analyzer or Sniffer is hardware or software that captures packets to decode and analyze its contents.
Protocol Analyzer can be used to:
Protocol Analyzer puts the Network Interface Card (NIC) in Promiscuous Mode.
In Promiscuous Mode, the NIC displays all the Network Traffic (Packets).
Protocol Analyzer is a great tool for the attacker.
Vulnerability Scanners maintain a database that categorizes and describes all the detected vulnerabilities.
Vulnerability Scanners can:
Open Vulnerability and Assessment Language (OVAL) is a “common language” for the exchanging of data collected by Security Vulnerability software.
OVAL vulnerability definitions are recorded in XML
Honey-pot:
Honey-net:
Vulnerability Assessment procedures are:
Vulnerability Scan is an automated software scan (search) of known security vulnerabilities (weaknesses) that creates a report of those potential exposures.
The report can be compared against a baseline scan for any changes.
Vulnerability Scan should be conducted when new technology equipment is deployed.
Vulnerability Scan:
Penetration Testing (Pentest) is designed to exploit any weakness in the system.
Penetration Testing:
Techniques used by the Penetration Tester:
Social Engineering tricks can be used to learn about the infrastructure.
Security Administrator Tool for Analyzing Networks (SATAN) requires no advanced technical knowledge for penetration testing.
Techniques used to mitigate attacks are:
Some view security as a nuisance to be tolerated.
Others regard security as essential for its survival.
This is the security posture (approach or philosophy).
Elements that make up a Security Posture are:
Baseline is a standard security checklist used to evaluate a Security Posture.
Baseline outlines the major security considerations for a system.
It is the starting point for a solid security.
Proper Controls mitigate and deter attacks.
A Closed Circuit TV (CCTV) is a control but it cannot prevent an attack.
A security guard at the entrance could prevent an attack.
Does safety take priority over security?
If the power fails, an electromagnetic door can prevent people escaping a building on fire.
A Fail-open Lock will open the door even if power fails.
A Fail-safe (Fail-secure) Lock will not open if the power fails.
Fail-safe Firewall will close the program or even stop the OS to prevent any malicious activity.
Fail-open Firewall will permit traffic in and out and open the system to attacks.
Hardening eliminates as many risks as possible and makes the system more secure.
Types of Hardening techniques are:
Reporting can take the form of Alarms or Alerts.
Reports on trends can indicate a serious impending situation.
A trend report may indicate that multiple user accounts are experiencing multiple password attempts.
Software Verification Consultant @ NCC Group | Cybersecurity Specialist
2yGreat post!!
I come with real data on how DDoS attackers will take advantage of your vulnerabilities before an attack and not after.
2yHow do you run DDoS assessment?